in ,

STORED XSS IN API.MEDIA.ATLASSIAN.COM VIA DOC FILE (IOS)

Title: XSS stored on file https://api.media.atlassian.com on iOS browsers via msoffice (doc) file.

Product / URL: Any associated *.atlassian.com or *.atl-paas.net domain that can be exploited DIRECTLY from the *.atlassian.net instance

Report sent via Bugcrowd Atlassian Program

This post was created with our nice and easy submission form. Create your post!

What do you think?

Posted by SH

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Microsoft finds new macOS vulnerability, Shrootless, that could

Phishing Site Takedown – Guard your Domain